-
08/10/2023, 08:45
-
Remy Mudingay (European Spallation Source ERIC)08/10/2023, 09:00
The global shift to remote work during the COVID-19 pandemic significantly widened our cyber threat landscape, leaving many organisations exposed. A notable case was the successful breach of ESS corporate network by a recognised ransomware group that executed credential stuffing attack. During the 8th Control System Cyber-Security workshop we plan to examine this incident, focusing on the...
Go to contribution page -
Antonin Fringant08/10/2023, 09:30
Today more and more control systems are accessed and administered remotely. However many of the existing solutions are not satisfying because they are either unsecure, bad in term of performance or proprietary softwares. For example in 2019, Kasperky found 37 vulnerabilities in four different implementations of VNC.
Go to contribution page
That's why we created our own graphical remote access solution written in... -
Marc Vanden Eynden (CERN)08/10/2023, 10:20
A new CERN IT governance model was put in place in 2021 between the CERN IT department and the Accelerator and Technology Sector (ATS) in view of preparing the Accelerator control system infrastructure for the LHC high luminosity era. Flagship projects such as the adoption of containerization technology and orchestrators or the review of the network isolation for Accelerator control offer...
Go to contribution page -
Mr Gregory R White (SLAC)08/10/2023, 11:20
We describe a program at SLAC to truly understand accelerator cyber
Go to contribution page
vulnerabilities as they exist at SLAC and similar facilities, improve
accelerator cyber security generally, engage the U.S. Dept. of Energy in
collaboration and funding, and provide the concomitant upgrades to
EPICS Base for the accelerator community. -
Mr Georg McIntyre (Level-N)08/10/2023, 13:00
A presentation of the 2 years implementation plan primarily undertaken by Osprey DCS, SLAC and ORNL and funded by the US Department of Energy
The plan wll update PVXS (C++) and core-pva (Java, in CS-Studio/Phoebus) to support secure network connections based on the industry standard Transport Layer Security (TLS) technology. PVA clients that search for PV names will be able to indicate...
Go to contribution page -
Stefan Lueders (CERN)08/10/2023, 13:35
With the growing complexity of the IT hardware and software stack, with the prelevant usage of central computing resources for Internet-facing services, user services but also serving industrial control systems (OT), the design of data centre architectures and in particular networks becoming more and more challenging. This presentation will introduce the dilemma of creating a highly agile and...
Go to contribution page -
Benjamin Bolling (European Spallation Source ERIC)08/10/2023, 14:10
Many distributed version control platforms utilizing open-source worldwide collaboration, such as GitLab and GitHub, have built-in mechanisms allowing for robust version-control and smooth automation via e.g. pipelines. At some large-scale research facilities, some also trigger automatic deployments of the latest version of the software to clients otherwise isolated on private networks –...
Go to contribution page -
Brice Copy (CERN)08/10/2023, 14:40
Supply chain attacks have surged since 2013, offering attackers an easy and lucrative method to breach vital organizational functions. In the past four years alone, notable supply chain attacks have grown fourfold. This trend is predicted to persist unless effective countermeasures are embraced. In the realm of open science, the heavy dependence on open-source code for scientific software...
Go to contribution page -
Stefan Lueders (CERN)08/10/2023, 15:30
Like any other organization, university or enterprise, CERN is permanently under attack. The risks --- legally or financially, to CERN's operation or reputation --- cannot be neglected.
The CERN Computer Security Team has been mandated to protect the operations and reputation of CERN against cyber-threats. In this presentation we will go through the different defense mechanisms --- controls...
Go to contribution page -
Birgit Plötzeneder (ELI)
Choose timezone
Your profile timezone: